cybersecurity, Twitter, 4/12/2019 7:08:24 AM, 193498


FAQ | Problem?

cybersecurity_2019-04-11_17-28-09.xlsx
cybersecurity_2019-04-11_17-28-09.xlsx
From:
Connected Action NodeXL-Reports
Uploaded on:
April 12, 2019
Short Description:
cybersecurity via NodeXL http://bit.ly/2KsyNq5
@sectest9
@tendellshow
@forbes
@cephalopodluke2
@cybazesocial
@thecyberwire
@cybersecuritysf
@chidambara09
@womencybersec
@ipfconline1

Top hashtags:
#cybersecurity
#infosec
#security
#ai
#iot
#hacker
#malware
#tech

Description:
Description
The graph represents a network of 13,725 Twitter users whose recent tweets contained "cybersecurity", or who were replied to or mentioned in those tweets, taken from a data set limited to a maximum of 18,000 tweets. The network was obtained from Twitter on Friday, 12 April 2019 at 03:25 UTC.

The tweets in the network were tweeted over the 1-day, 4-hour, 39-minute period from Wednesday, 10 April 2019 at 19:54 UTC to Friday, 12 April 2019 at 00:33 UTC.

Additional tweets that were mentioned in this data set were also collected from prior time periods. These tweets may expand the complete time period of the data.

There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, and a self-loop edge for each tweet that is not a "replies-to" or "mentions".

The graph is directed.

The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.

The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.


Author Description


Overall Graph Metrics
Vertices : 13725
Unique Edges : 18393
Edges With Duplicates : 8652
Total Edges : 27045
Self-Loops : 7441
Reciprocated Vertex Pair Ratio : 0.0321995748405652
Reciprocated Edge Ratio : 0.0623902113998425
Connected Components : 3505
Single-Vertex Connected Components : 2334
Maximum Vertices in a Connected Component : 7590
Maximum Edges in a Connected Component : 19790
Maximum Geodesic Distance (Diameter) : 17
Average Geodesic Distance : 5.40753
Graph Density : 8.76451129448153E-05
Modularity : 0.58649
NodeXL Version : 1.0.1.410

Top Influencers: Top 10 Vertices, Ranked by Betweenness Centrality
Top URLs
Top URLs in Tweet in Entire Graph:
[142] https://techcrunch.com/2019/04/10/cybersecurity-101-robocalls/
[74] http://www.bradegeland.com/
[53] https://thehill.com/policy/cybersecurity/400882-wikileaks-says-senate-panel-requested-assange-testimony-in-russia-probe
[51] https://www.technologyreview.com/s/613054/cybersecurity-critical-infrastructure-triton-malware/?utm_source=twitter&utm_campaign=site_visitor.unpaid.engagement&utm_medium=tr_social
[45] https://cointelegraph.com/news/cybersecurity-firm-wisekey-subsidiary-nets-7-mln-in-pre-sto-investment-ahead-of-q2-sale
[41] https://tuftsmagazine.com/issues/magazine/2019/spring/teaching-cybersecurity
[37] https://go.usa.gov/xmg3m
[37] https://www.maria-johnsen.com/multilingualSEO-blog/how-i-recovered-a-hacked-website/
[35] https://www.berkeleyside.com/2019/04/09/berkeley-high-student-tried-to-rig-his-own-election-exposing-flaw-in-districts-cybersecurity
[33] https://go.usa.gov/xmg6t

Top URLs in Tweet in G1:
[77] https://techcrunch.com/2019/04/10/cybersecurity-101-robocalls/
[36] https://cointelegraph.com/news/cybersecurity-firm-wisekey-subsidiary-nets-7-mln-in-pre-sto-investment-ahead-of-q2-sale
[24] http://www.arrakisconsulting.com
[16] https://ltauditor.com/splunk/
[16] https://www.wired.com/story/trump-homeland-security-purge-worries-cybersecurity-experts
[13] https://thehill.com/policy/cybersecurity/400882-wikileaks-says-senate-panel-requested-assange-testimony-in-russia-probe
[12] https://www.acg.org/newjersey/events/acg-nj-morris-event-hacked-may-15-2019?platform=hootsuite
[11] https://www.reuters.com/article/us-cofense-m-a/cybersecurity-firm-cofense-says-pamplona-to-sell-stake-after-u-s-probe-idUSKCN1RM30W?feedType=RSS&feedName=technologyNews
[11] https://www.forbes.com/sites/zakdoffman/2019/04/11/forget-russia-china-and-iran-up-to-80-of-cybersecurity-threats-are-closer-to-home/
[11] https://phishstats.info/

Top URLs in Tweet in G2:
[74] http://www.bradegeland.com/
[19] http://blog.adext.com/artificial-intelligence-technologies-2019/
[16] https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/ten-trends-shaping-the-internet-of-things-business-landscape?cid=soc-web
[16] https://dzone.com/articles/why-privacy-is-the-biggest-tech-issue-of-2019
[14] https://inspiredelearning.com/blog/implementing-and-embedding-effective-cybersecurity-training-in-your-company/?utm_source=Twitter
[14] https://www.tiecon.org/?campaign=Volunteers&source=Sanjiv_More
[12] https://www.cpomagazine.com/cyber-security/largest-leak-in-history-email-data-breach-exposes-over-two-billion-personal-records/
[12] https://chinadeep.info/top-10-enterprise-software-stocks-by-market-cap/
[12] https://inspiredelearning.com/blog/cyber-talk-radio-cybersecurity-awareness-training/?utm_source=Twitter
[11] https://www.mckinsey.com/business-functions/risk/our-insights/critical-infrastructure-companies-and-the-global-cybersecurity-threat?cid=other-eml-alt-mip-mck

Top URLs in Tweet in G3:
[10] https://dl.bookfunnel.com/q5r08zxodl
[8] https://www.thesslstore.com/blog/80-eye-opening-cyber-security-statistics-for-2019/
[7] https://pulsedive.com/
[7] https://insidecybersecurity.com/sm-signup
[7] https://techwireasia.com/2019/04/cross-out-cyber-breaches-to-achieve-success-in-manufacturing/
[6] https://www.conxion.be/nieuws/3-op-4-bedrijven-dreigt-slachtoffer-te-worden-van-cybercriminaliteit/?utm_source=twitter&utm_medium=social&utm_campaign=Cybersecurity
[6] https://www.helpnetsecurity.com/2019/04/01/threat-to-industrial-computers/?fbclid=IwAR3fel6HLOzfeUbIlsEPmERES-0IOBKcb9Ep1T35uxE8s-CvZPr2v4FQvoo
[5] https://www.theverge.com/2019/4/10/18305378/amazon-alexa-ai-voice-assistant-annotation-listen-private-recordings?utm_source=dlvr.it&utm_medium=twitter
[5] https://lnkd.in/eK75-_j
[5] https://thehackernews.com/2019/04/wpa3-hack-wifi-password.html

Top URLs in Tweet in G4:
[7] https://www.csoonline.com/article/3387418/5-ways-to-curb-cybersecurity-burnout.html
[6] https://www.fedscoop.com/federal-cybersecurity-talent-initiative/
[5] https://www.bbc.com/news/business-47724438
[5] https://www.helpnetsecurity.com/2019/04/10/closed-loop-automation/
[5] https://www.techrepublic.com/article/how-to-completely-and-securely-delete-files-in-windows/
[4] https://www.helpnetsecurity.com/2019/04/10/cryptomining-still-dominates/
[4] https://securityweek.com/
[4] https://www.securityweek.com/why-not-always-multi-factor-authentication
[4] https://www.helpnetsecurity.com/2019/04/08/cios-and-cisos-hold-off-on-crucial-updates/
[4] https://www.pinterest.com.au/pin/593630794609395676/sent/?sfo=1&sender=593630932041296801&invite_code=3a6728dde1f74c348dcbda03a87b9534

Top URLs in Tweet in G5:
[11] https://www.bankinfosecurity.com/interviews/women-in-cybersecurity-progress-report-i-4288
[7] https://thecyberwire.com/podcasts/cw-podcasts-daily-2019-04-10.html
[5] https://armoredcode.com/blog/a-cracking-the-perimeter-journey-1-my-own-lab/
[5] https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_11.html
[5] https://thecyberwire.com/issues/issues2019/March/WTW_2019_04_06.html
[5] https://cybersecurityresource.com/
[5] https://www.helpnetsecurity.com/2019/04/03/women-cybersecurity-workforce/
[4] https://thecyberwire.com/podcasts/cw-podcasts-daily-2019-04-11.html
[4] https://infosecjobs.world/2019/03/enhance-your-resume-with-these-tips-right-now/
[4] http://www.amazon.com/Hacked-Again-Scott-N-Schober/dp/099690221X

Top URLs in Tweet in G6:
[15] https://trib.al/G059M48
[12] https://techcrunch.com/2019/04/10/cybersecurity-101-robocalls/
[8] https://www.forbes.com/sites/willemsundbladeurope/2019/04/11/security-is-key-to-the-success-of-industry-4-0/
[7] https://www.wired.com/story/tajmahal-swiss-army-spyware-apt/
[7] https://www.agari.com/email-security-blog/sharing-bec-intel-greater-good/#.XK8o1Ymivn8.twitter
[5] https://www.theguardian.com/us-news/2019/apr/05/mar-a-lagos-bizarre-breach-a-mystery-woman-malware-and-trumps-circus?CMP=share_btn_tw
[5] https://www.bleepingcomputer.com/news/security/hyperlink-auditing-pings-being-used-to-perform-ddos-attacks/
[5] https://www.theregister.co.uk/2019/04/10/lazarus_group_malware/
[4] https://techcrunch.com/2019/04/08/trickerbot-malware-tax-day/
[4] https://www.techradar.com/news/smart-home-security-10-hacks-to-protect-your-home-from-hackers

Top URLs in Tweet in G7:
[9] https://cyberscotlandweek.scot/
[4] https://www.zdnet.com/article/drug-firm-bayer-targeted-by-cyberattack-threat-contained/
[4] https://threatpost.com/podcast-chris-vickery-on-upguards-discovery-of-millions-of-facebook-records/143535/
[3] https://www.gov.uk/government/news/businesses-and-charities-urged-to-take-action-to-prevent-cyber-attacks
[3] https://thehill.com/opinion/cybersecurity/436613-america-is-still-trying-to-win-the-last-cyber-war
[3] https://www.bitmat.it/blog/news/84412/generazione-z-un-futuro-che-guarda-al-passato
[3] https://nordvpn.com/blog/tell-if-laptop-camera-hacked/?utm_source=twitter.com&utm_medium=social&utm_campaign=blog
[3] https://beechermadden.com/podcast-parthasarathi-chakraborty-cybersecurity-architecture-engineering-strategy/?platform=hootsuite
[3] https://www.peerlyst.com/posts/all-about-the-tor-project-kimberly-crawley
[3] https://www.venafi.com/blog/domain-spoofing-still-serious-threat-online-retailers

Top URLs in Tweet in G8:
[5] https://www.darkreading.com/vulnerabilities---threats/dragonblood-vulnerabilities-seep-into-wpa3-secure-wifi-handshake/d/d-id/1334407
[5] https://www.darkreading.com/careers-and-people/fortinet-continues-commitment-to-close-the-cyber-skills-gap-through-nse-institute-program/d/d-id/1334393
[5] https://marine-offshore.bureauveritas.com/digital/your-applications/icheck-cyber-vessel
[4] https://www.startmag.it/innovazione/lo-sapete-che-exodus-ha-colpito-anche-gli-iphone/
[4] https://www.darkreading.com/careers-and-people/6-essential-skills-cybersecurity-pros-need-to-develop-in-2019/d/d-id/1334312
[3] https://www.lastwatchdog.com/new-tech-network-traffic-analysis-gets-to-ground-truth-about-data-moving-inside-the-perimeter/
[3] https://www.securitymagazine.com/articles/90105-cyber-security-trends-to-watch-for-in-2019
[3] https://www.itpro.co.uk/security/33427/yahoo-offers-1175m-settlement-for-2013-monster-hack
[3] https://www.allsides.com/news/2019-04-11-0718/wikileaks-founder-julian-assange-arrested-and-found-guilty-london
[3] https://www.diplomatie.gouv.fr/IMG/pdf/g7_-_dinard_declaration_on_cyber_initiative_cle811175.pdf

Top URLs in Tweet in G9:
[10] https://www.forbes.com/sites/zakdoffman/2019/04/11/forget-russia-china-and-iran-up-to-80-of-cybersecurity-threats-are-closer-to-home/#4e3711047eb3
[9] https://www.itspmagazine.com/events/executive-alliances-security-leaders-summit-new-york-spring-2019
[5] https://itspmagazine.com/event-listings/
[4] https://www.itspmagazine.com/events/the-medical-device-amp-iot-summit-2019
[4] https://www.itspmagazine.com/company-directory-introduction#Featured
[4] https://www.itspmagazine.com/company-directory/cyber-security-summit
[4] http://www.bing.com/news/apiclick.aspx?ref=FexRss&aid=&tid=B6B3504F08984003AC6D4ECE41F8EA3F&url=https%3a%2f%2fwww.meritalk.com%2farticles%2fmajority-of-organizations-lack-a-cybersecurity-incident-response-plan%2f&c=2876591954446125685&mkt=en-us
[3] http://www.bing.com/news/apiclick.aspx?ref=FexRss&aid=&tid=5E89938A03C746D089CDAE5B6653FC0F&url=https%3a%2f%2fwww.csoonline.com%2farticle%2f3387418%2f5-ways-to-curb-cybersecurity-burnout.html&c=13371980889072129874&mkt=en-us
[3] https://deltarisk.com/resources/events/16th-annual-secureworld-philadelphia/
[3] http://www.bing.com/news/apiclick.aspx?ref=FexRss&aid=&tid=600BB6B774584147800C5D7318D4B95B&url=https%3a%2f%2fthehill.com%2fopinion%2fcybersecurity%2f437739-we-arent-prepared-for-the-next-wave-of-cybersecurity-risks&c=17554658131602583580&mkt=en-us

Top URLs in Tweet in G10:
[5] https://www.technologyreview.com/s/613054/cybersecurity-critical-infrastructure-triton-malware/
[2] https://www.wsj.com/articles/u-s-officials-pressure-russia-linked-buyout-firm-to-sell-cybersecurity-company-11554925363
[2] https://threadreaderapp.com/thread/1116069263280889863.html
[1] http://fortune.com/2018/02/26/blackrock-private-equity-buy-phishme/
[1] https://cryptologicfoundation.org/news-events/event/2019/04/12/ccei-virtual-training-for-students-all-about-cybersecurity-careers/244862
[1] https://www.pogo.org/letter/2018/03/pogo-supports-funding-request-benefiting-election-cybersecurity/
[1] http://fortune.com/2018/02/26/blackrock-private-equity-buy-phishme/?utm_source=twitter.com&utm_medium=social&utm_campaign=social-share-article
[1] https://paper.li/ideagov/gov20?edition_id=56d27ba0-5c73-11e9-bcf0-0cc47a0d1605
[1] https://www.securityweek.com/reservation-systems-used-many-hotels-expose-user-data
[1] http://www.bing.com/news/apiclick.aspx?ref=FexRss&aid=&tid=600BB6B774584147800C5D7318D4B95B&url=https%3a%2f%2fwww.techrepublic.com%2farticle%2fhow-a-new-public-private-partnership-will-fill-cybersecurity-gaps-for-the-fbi-and-cia%2f&c=13416952860644213601&mkt=en-us

Top Domains
Top Domains in Tweet in Entire Graph:
[501] lnkd.in
[450] twitter.com
[365] tobem.com
[260] forbes.com
[239] co.uk
[211] techcrunch.com
[162] helpnetsecurity.com
[157] dy.si
[157] bradegeland.com
[155] youtube.com

Top Domains in Tweet in G1:
[230] lnkd.in
[101] techcrunch.com
[95] twitter.com
[77] forbes.com
[72] co.uk
[56] cointelegraph.com
[33] wired.com
[31] helpnetsecurity.com
[30] reuters.com
[28] dlvr.it

Top Domains in Tweet in G2:
[335] tobem.com
[157] bradegeland.com
[75] dlvr.it
[65] twitter.com
[56] cryptostaunch.com
[49] iiot-world.com
[37] mckinsey.com
[36] techrepublic.com
[33] co.uk
[28] techvisor.nl

Top Domains in Tweet in G3:
[49] lnkd.in
[39] twitter.com
[27] zdnet.com
[26] co.uk
[23] pulsedive.com
[22] twi.li
[22] vpnpro.com
[18] infosecurity-magazine.com
[15] youtube.com
[15] helpnetsecurity.com

Top Domains in Tweet in G4:
[80] dy.si
[41] helpnetsecurity.com
[30] csoonline.com
[24] lnkd.in
[18] lastline.com
[16] okt.to
[13] twitter.com
[11] securityweek.com
[9] computerweekly.com
[8] youtube.com

Top Domains in Tweet in G5:
[28] lnkd.in
[26] thecyberwire.com
[18] twitter.com
[16] armoredcode.com
[12] bankinfosecurity.com
[11] amazon.com
[9] dy.si
[7] cybersecurityventures.com
[7] washingtonpost.com
[6] co.uk

Top Domains in Tweet in G6:
[62] forbes.com
[23] zdnet.com
[22] techcrunch.com
[17] trib.al
[12] bleepingcomputer.com
[11] co.uk
[10] infosecurity-magazine.com
[8] wired.com
[7] securityboulevard.com
[7] agari.com

Top Domains in Tweet in G7:
[34] helpnetsecurity.com
[31] lnkd.in
[28] medium.com
[20] bleepingcomputer.com
[18] informationsecuritybuzz.com
[18] twitter.com
[18] twi.li
[16] threatpost.com
[12] com.au
[11] cyberscotlandweek.scot

Top Domains in Tweet in G8:
[22] darkreading.com
[21] co.uk
[11] securitynewspaper.com
[9] radian6.com
[7] wired.com
[7] lnkd.in
[6] bit.ly
[6] twitter.com
[5] helpnetsecurity.com
[5] databreachtoday.com

Top Domains in Tweet in G9:
[64] bing.com
[36] itspmagazine.com
[16] forbes.com
[11] washingtonpost.com
[9] deltarisk.com
[7] sentinelone.com
[6] twitter.com
[5] lnkd.in
[4] co.uk
[4] nist.gov

Top Domains in Tweet in G10:
[5] technologyreview.com
[2] fortune.com
[2] wsj.com
[2] threadreaderapp.com
[1] cryptologicfoundation.org
[1] pogo.org
[1] paper.li
[1] securityweek.com
[1] bing.com
[1] axios.com

Top Hashtags
Top Hashtags in Tweet in Entire Graph:
[10219] cybersecurity
[1878] infosec
[1241] security
[974] ai
[908] iot
[578] hacker
[509] malware
[502] tech
[502] cyber
[488] technology



Top Hashtags in Tweet in G1:
[1496] cybersecurity
[158] security
[140] infosec
[88] technology
[59] iot
[59] data
[56] cyber
[51] privacy
[48] tech
[47] it

Top Hashtags in Tweet in G2:
[2098] cybersecurity
[625] ai
[528] iot
[438] hacker
[384] infosec
[342] bigdata
[335] security
[267] machinelearning
[264] tech
[226] fintech

Top Hashtags in Tweet in G3:
[1158] cybersecurity
[358] infosec
[174] security
[123] malware
[101] cybercrime
[68] itsecurity
[64] cyberattacks
[64] iot
[60] informationsecurity
[58] ransomware

Top Hashtags in Tweet in G4:
[462] cybersecurity
[78] infosec
[66] security
[37] malware
[30] zerotrust
[22] business
[21] iot
[20] ai
[20] ciso
[18] ddos

Top Hashtags in Tweet in G5:
[350] cybersecurity
[107] infosec
[47] security
[37] women
[21] womenintech
[20] blog
[19] bot
[18] careertransitioners
[17] cybercrime
[17] cwpodcast

Top Hashtags in Tweet in G6:
[346] cybersecurity
[104] hacking
[71] hackers
[61] infosec
[43] technology
[43] cybersec
[41] malware
[38] darkode
[37] iot
[35] cybercriminals

Top Hashtags in Tweet in G7:
[461] cybersecurity
[113] infosec
[63] security
[52] alphacert
[42] cybercrime
[38] cyber
[32] malware
[32] ciso
[29] cyberattack
[28] dfir

Top Hashtags in Tweet in G8:
[410] cybersecurity
[50] infosec
[38] security
[24] cybercrime
[20] privacy
[19] it
[17] wikileaks
[17] julianassange
[16] informationsecurity
[15] hacker

Top Hashtags in Tweet in G9:
[196] cybersecurity
[41] infosec
[29] hewlettverify
[15] security
[14] cybercrime
[11] deltarisk
[10] women
[9] nice
[9] malware
[8] podcast

Top Hashtags in Tweet in G10:
[6] cybersecurity
[1] infosec
[1] hotel

Top Words
Top Words in Tweet in Entire Graph:
[10889] Words in Sentiment List#1: Positive
[9021] Words in Sentiment List#2: Negative
[99] Words in Sentiment List#3: Angry/Violent
[372391] Non-categorized Words
[392301] Total Words
[10213] #cybersecurity
[5029] cybersecurity
[2576] security
[1878] #infosec
[1502] cyber

Top Words in Tweet in G1:
[1496] #cybersecurity
[1291] cybersecurity
[411] security
[269] s
[262] new
[239] more
[214] cyber
[175] data
[158] firm
[158] #security

Top Words in Tweet in G2:
[2089] #cybersecurity
[626] #ai
[530] #iot
[438] #hacker
[384] #infosec
[381] cybersecurity
[375] security
[342] #security
[342] #bigdata
[316] gt

Top Words in Tweet in G3:
[1158] #cybersecurity
[358] #infosec
[292] security
[174] #security
[165] cybersecurity
[140] new
[132] more
[123] #malware
[118] data
[117] cyber

Top Words in Tweet in G4:
[462] #cybersecurity
[102] security
[83] cybersecurity
[78] #infosec
[76] more
[75] akamai
[66] #security
[54] new
[53] data
[51] s

Top Words in Tweet in G5:
[350] #cybersecurity
[294] cybersecurity
[207] women
[107] #infosec
[97] more
[72] security
[60] new
[53] out
[51] 2019
[49] cyber

Top Words in Tweet in G6:
[346] #cybersecurity
[113] beyondtrust
[104] #hacking
[104] security
[99] forbes
[79] cybersecurity
[71] #hackers
[67] techcrunch
[61] #infosec
[57] new

Top Words in Tweet in G7:
[462] #cybersecurity
[113] #infosec
[99] cyber
[88] team
[83] security
[71] cybersecurity
[66] acert
[63] #security
[55] s
[52] #alphacert

Top Words in Tweet in G8:
[410] #cybersecurity
[120] di
[73] il
[63] cybersecurity
[61] e
[60] per
[50] #infosec
[49] security
[44] cyber
[40] è

Top Words in Tweet in G9:
[224] cybersecurity
[196] #cybersecurity
[91] new
[89] infosechotspot
[87] security
[75] itspmagazine
[56] s
[56] 2019
[44] cyber
[41] #infosec

Top Words in Tweet in G10:
[162] pamplona
[148] cybersecurity
[95] cofense
[93] russia
[93] linked
[93] capital
[93] management
[91] officials
[91] wendysiegelman
[71] comey

Top Word Pairs
Top Word Pairs in Tweet in Entire Graph:
[624] #cybersecurity,#infosec
[406] cyber,security
[395] #cybersecurity,#hacker
[375] #infosec,#cybersecurity
[360] u,s
[258] gt,gt
[248] check,out
[247] #security,#cybersecurity
[227] #iot,#cybersecurity
[227] find,out

Top Word Pairs in Tweet in G1:
[120] cybersecurity,firm
[89] spamming,phone
[88] stop,robocalls
[88] robocalls,spamming
[83] u,s
[73] pre,sto
[68] firm,wisekey
[67] wisekey,subsidiary
[67] subsidiary,nets
[67] nets,7

Top Word Pairs in Tweet in G2:
[359] #cybersecurity,#hacker
[186] gt,gt
[173] #iot,#cybersecurity
[125] #security,#cybersecurity
[99] #infosec,#security
[84] #project,#management
[83] #cybersecurity,#machinelearning
[83] #ai,#agile
[83] #pmp,#project
[83] #agile,#iot

Top Word Pairs in Tweet in G3:
[136] #cybersecurity,#infosec
[92] #infosec,#cybersecurity
[37] #cybersecurity,#security
[31] cyber,security
[30] check,out
[29] #cybersecurity,#technology
[26] #cybersecurity,#cybercrime
[24] #infosec,#security
[22] find,out
[22] #security,#cybersecurity

Top Word Pairs in Tweet in G4:
[26] #infosec,#cybersecurity
[22] #cybersecurity,#infosec
[19] #zerotrust,#cybersecurity
[18] find,out
[16] read,more
[16] learn,more
[14] data,breaches
[13] csoonline,#zerotrust
[13] crucial,updates
[13] #cybersecurity,#seguridadinformática

Top Word Pairs in Tweet in G5:
[59] women,cybersecurity
[36] #cybersecurity,#infosec
[31] #infosec,#cybersecurity
[25] https,t
[25] t,co
[24] check,out
[22] here,link
[19] cybersecurity,industry
[18] #blog,#bot
[18] #bot,#cybersecurity

Top Word Pairs in Tweet in G6:
[45] forbes,#cybersecurity
[38] market,#darkode
[38] #darkode,back
[38] back,online
[37] #cybersecurity,#infosec
[37] notorious,#hacking
[36] forum,black
[36] black,market
[36] online,forbes
[35] #hacking,forum

Top Word Pairs in Tweet in G7:
[66] acert,team
[51] team,cyber_warlock
[51] #alphacert,#cybersecurity
[45] cyber_warlock,#alphacert
[44] #infosec,#cybersecurity
[26] #security,#cybersecurity
[24] smedian_network,#cybersecurity
[23] #cybersecurity,#infosec
[22] #cybersecurity,#ciso
[22] #ciso,#pentest

Top Word Pairs in Tweet in G8:
[21] julian,assange
[20] assange,arrested
[20] sempre,più
[20] il,nostro
[17] #cybersecurity,è
[17] è,tema
[17] tema,sempre
[16] #cybersecurity,#infosec
[16] #infosec,#cybersecurity
[12] #wikileaks,#julianassange

Top Word Pairs in Tweet in G9:
[37] cybersecurity,202
[36] new,#cybersecurity
[36] #cybersecurity,event
[32] itspmagazine,new
[29] cyber,security
[27] summit,2019
[27] cybersecurity,threats
[27] u,s
[26] microsoft,sql
[26] sql,server

Top Word Pairs in Tweet in G10:
[93] russia,linked
[93] linked,pamplona
[93] pamplona,capital
[93] capital,management
[71] verify,cybersecurity
[71] cybersecurity,conference
[69] cybersecurity,company
[69] oliverdarcy,comey
[67] officials,pressure
[67] pressure,russia

Top Replied-To
Top Replied-To in Entire Graph:
@akamai
@fujio0606
@dfat
@hacks4pancakes
@cryptomodconf
@cyberdefensemag
@realdonaldtrump
@womencssociety
@cdwcorp
@srinualme

Top Replied-To in G1:
@vipresecurity

Top Replied-To in G2:
@fujio0606
@srinualme
@chuckdbrooks
@topcybernews
@cytalks
@rhomboid1mf
@businessviews
@jblefevre60
@alexa99
@mantissts

Top Replied-To in G3:
@dfat
@tufintech
@paigeneedling
@nccgroupplc
@healthtechatx
@office365
@davidlipson
@expressvpn
@saasmax
@csu

Top Replied-To in G4:
@akamai
@securityweek
@iotagenda
@tbgsecurity
@ibmsecurity
@cybersecuritysf
@proofpoint
@sme_security
@simon_t_gibbard
@meritalk

Top Replied-To in G5:
@womencssociety
@snubs
@iancoldwater
@bbcnews
@macleanheather
@hacks4pancakes
@tenablesecurity
@isc2
@stephandsec
@epatientdave

Top Replied-To in G6:
@mlapeters

Top Replied-To in G7:
@cdwcorp
@kamalaharris
@carbonblack_inc
@cbinsights
@robertherjavec
@apple

Top Replied-To in G8:
@hpe

Top Replied-To in G9:
@secureworld
@cdwcorp
@alexstamos
@portalguard
@lefty_old
@yahoo
@cisamanfra

Top Replied-To in G10:
@therealjomo33
@harmonyis1
@gemma__rn
@natashabertrand

Top Mentioned
Top Mentioned in Entire Graph:
@forbes
@mikequindazzi
@jennycohn1
@uscert_gov
@wendysiegelman
@antgrasso
@beyondtrust
@infosechotspot
@valaafshar
@techcrunch

Top Mentioned in G1:
@worldstack
@ajbcsurveys
@vistapresearch
@gaincheap
@anchainai
@netspend
@frankiesoo_logo
@swbenefitsassoc
@techjollof

Top Mentioned in G2:
@mikequindazzi
@antgrasso
@ipfconline1
@ronald_vanloon
@fisher85m
@shirastweet
@paula_piccard
@mclynd
@cyberdomain
@influencerprom1

Top Mentioned in G3:
@vpnpro
@crowdstrike
@corebts
@microfocussec
@netzpalaver
@barracuda
@cylanceinc
@recordedfuture
@netconnectnyc
@kfhgroup

Top Mentioned in G4:
@csoonline
@akamai
@helpnetsecurity
@ibmsecurity
@globalsign
@checkpointsw
@welivesecurity
@concertina226
@ibm
@securityweek

Top Mentioned in G5:
@cybersecuritysf
@isc2
@forsci_q
@thecyberwire
@fireeye
@womencssociety
@cyber_talents
@wicysorg
@vasujakkal
@womenknowcyber

Top Mentioned in G6:
@forbes
@beyondtrust
@techcrunch
@onelogin
@attcyber
@zdnet
@whatismalware
@mlapeters
@sarastraley
@rsasecurity

Top Mentioned in G7:
@smedian_network
@thecyberawards
@static_d
@cbinsights
@louisitaa
@ncsc
@youthfederation
@cybergogiver
@kim_crawley
@martinyouthfed

Top Mentioned in G8:
@darkreading
@bennyfiorini
@ey_italy
@accenturesecure
@cyberdomain
@ciscoitalia
@cnn
@cisconetacad
@byronacohido
@radware

Top Mentioned in G9:
@infosechotspot
@itspmagazine
@cisagov
@washingtonpost
@nistcyber
@adam_k_levin
@forbes
@comey
@stealthbits
@cisamanfra

Top Mentioned in G10:
@wendysiegelman
@oliverdarcy
@natashabertrand
@rebeccaballhaus
@cryptmf
@iwillleavenow
@harikunzru
@adam_k_levin
@jennycohn1
@porpentina2017

Top Tweeters
Top Tweeters in Entire Graph:
@occuworld
@the_news_diva
@tmobilehelp
@easy_branches
@jojokejohn
@sectest9
@resilient_ent
@myalliesnews
@javascriptd
@robre62

Top Tweeters in G1:
@occuworld
@myalliesnews
@koltovskoyyakov
@eaglestarnet
@cybertoolsbooks
@akemoi
@webironbots
@bitcoinagile
@rocketnews1
@techl0g

Top Tweeters in G2:
@easy_branches
@jojokejohn
@javascriptd
@cyberdomain
@nosqldigest
@evankirstel
@jilliemary
@gamergeeknews
@smartcityfeed
@chidambara09

Top Tweeters in G3:
@sectest9
@mulher_noticia
@windows
@mouse458
@abcnews
@adekleine
@pdfstreaming
@yahoofinance
@acountrydivas
@techjunkiejh

Top Tweeters in G4:
@nytimes
@wbaltv11
@cnbc
@mailonline
@ashot_
@itvnews
@pebbleinwaters
@tmmmarshall
@panther_modern
@bbcbusiness

Top Tweeters in G5:
@businessinsider
@thedailybeast
@kas_stoner
@zombiesarebad
@thetimes
@weems
@verge
@thecyberwire
@divinetechygirl
@valdesjo77

Top Tweeters in G6:
@business
@aaroncuddeback
@victorb123
@telegraph
@abc7newsbayarea
@mercnews
@chahali
@latimes
@trazlersgal
@forbes

Top Tweeters in G7:
@pcexpander
@ceektechnology
@smesecurity
@godaddy
@btrtg
@naomitimperley
@rjacksix
@fromgirltogirl
@theiotwarehouse
@namecheap

Top Tweeters in G8:
@pelias01
@huffpost
@italiastartup_
@usatoday
@cnn
@securityaffairs
@natlawreview
@gasparripdl
@forza_italia
@hitech_guru

Top Tweeters in G9:
@trixywh
@kimvie
@samy45
@washingtonpost
@politico
@inc
@pagilchrist
@buzzfeednews
@v2aggie2
@cplinfochandan

Top Tweeters in G10:
@the_news_diva
@roblwilson
@argojournal
@pas5974
@theresamax
@jeffersonobama
@jhamby
@morgfair
@threadreaderapp
@amb0306


We use necessary cookies to make our site work. We’d like to set additional cookies to understand site usage, make site improvements and to remember your settings. We also use cookies set by other sites to help deliver content from their services.